A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Analysis of SKINNY under Related-Tweakey Settings
2017
IACR Transactions on Symmetric Cryptology
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model. ...
Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching ...
In this work, we focus on the security analysis of SKINNY family of lightweight block ciphers. ...
doi:10.46586/tosc.v2017.i3.37-72
fatcat:ekler62d6zbcjndcr5ojb7gkti
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)
2017
IACR Transactions on Symmetric Cryptology
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model. ...
Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching ...
In this work, we focus on the security analysis of SKINNY family of lightweight block ciphers. ...
doi:10.13154/tosc.v2017.i3.37-72
dblp:journals/tosc/LiuGL17
fatcat:aowr3iihtnhqtgcy6y47uvofmu
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
[chapter]
2016
Lecture Notes in Computer Science
We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security ...
Secondly, we present MANTIS, a dedicated variant of SKINNY for lowlatency implementations, that constitutes a very efficient solution to the problem of designing a tweakable block cipher for memory encryption ...
Security Analysis In this section, we provide a short summary of the in-depth analysis we conducted on the security of the SKINNY family of block ciphers. ...
doi:10.1007/978-3-662-53008-5_5
fatcat:ksxdbtvcczhffd43ovxtxhw6iy
Cryptanalysis of Reduced round SKINNY Block Cipher
2018
IACR Transactions on Symmetric Cryptology
To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey ...
Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively. ...
In this paper, we search for zero-correlation distinguishers [BR14] and the related-tweakey impossible differential characteristics [JD03] which have been missing in the security analysis presented ...
doi:10.13154/tosc.v2018.i3.124-162
dblp:journals/tosc/SadeghiMB18
fatcat:fhho3h2h7ffarbywnxng7anuhi
SKINNY-AEAD and SKINNY-Hash
2020
IACR Transactions on Symmetric Cryptology
To highlight the extensive amount of third-party analysis that SKINNY obtained since its publication, we briefly survey the existing cryptanalysis results for SKINNY-128-256 and SKINNY-128-384 as of February ...
a very comfortable security margin. https://csrc.nist.gov/Projects/Lightweight-Cryptography ...
Acknowledgements The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA ...
doi:10.13154/tosc.v2020.is1.88-131
dblp:journals/tosc/BeierleJKLMPSSS20
fatcat:u4jtzsxthjgs7gkroyq5o7mv6y
Cryptanalysis of Reduced round SKINNY Block Cipher
2018
IACR Transactions on Symmetric Cryptology
To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey ...
Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively. ...
In this paper, we search for zero-correlation distinguishers [BR14] and the related-tweakey impossible differential characteristics [JD03] which have been missing in the security analysis presented ...
doi:10.46586/tosc.v2018.i3.124-162
fatcat:kfplm7aqizbwjcsxys3np4vbqa
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
IACR Transactions on Symmetric Cryptology
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. ...
Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny. ...
The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] . ...
doi:10.13154/tosc.v2019.i1.192-235
dblp:journals/tosc/AnkeleDGLLT19
fatcat:ixcmix2zjrhojnn7aj6vid432u
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
Zenodo
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. ...
Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of QARMA, MANTIS, and Skinny. ...
The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] . ...
doi:10.5281/zenodo.2593578
fatcat:rka7qhw4l5b75bnhdfugcixnzi
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
IACR Transactions on Symmetric Cryptology
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. ...
Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny. ...
The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] . ...
doi:10.46586/tosc.v2019.i1.192-235
fatcat:ivshx5lfhjfbdlezsmg743phvy
Cryptanalysis of Forkciphers
2020
IACR Transactions on Symmetric Cryptology
to the other), but the attack against ForkSkinny uses a weakness of the tweakey schedule in encryption queries (when one branch of the tweakey schedule is skipped). ...
Then we present the first analysis of ForkSkinny, showing that the best attacks on Skinny can be extended to one round for most ForkSkinny variants, and up to three rounds for ForkSkinny-128-256. ...
Acknowledgments This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation program (grant agreement no. 714294 -acronym QUASYModo ...
doi:10.13154/tosc.v2020.i1.233-265
dblp:journals/tosc/BariantDL20
fatcat:zwgafu35gjbvxpxtqnztifazia
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
2021
IACR Transactions on Symmetric Cryptology
Our key-recovery attacks on a few versions of round-reduced SKINNY and ForkSkinny cover 1 to 2 more rounds than the best previous attacks. ...
In this paper, we try to combine the two phases in a uniform automatic model.Concretely, we apply this idea to automate the related-key rectangle attacks on SKINNY and ForkSkinny. ...
And Romulus is one of the finalists in the LWC project. So the security analysis of SKINNY is of great importance, which also affects the security evaluation of these candidates. ...
doi:10.46586/tosc.v2021.i2.249-291
fatcat:43ui6tm7evbftjoylx4o5djksi
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018–2019 Cryptanalysis Competition
[chapter]
2020
Lecture Notes in Computer Science
In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY. ...
Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode. ...
The definition of the tweakey schedule of SKINNY implies that the round tweakeys of all the even rounds (similarly of all the odd rounds) are related together by linear relations. ...
doi:10.1007/978-3-030-38471-5_6
fatcat:v7oevhhgyzbxva7kywcpzaxgju
Analysis of AES, SKINNY, and Others with Constraint Programming
2017
IACR Transactions on Symmetric Cryptology
As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition ...
6-round AES-128 in the related-key model. ...
The figure of AES in the paper is produced by TkiZ [Jea16] . The ...
doi:10.46586/tosc.v2017.i1.281-306
fatcat:n4hq4vh3pbhobndlzao6wflk54
Analysis of AES, SKINNY, and Others with Constraint Programming
2017
IACR Transactions on Symmetric Cryptology
As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition ...
6-round AES-128 in the related-key model. ...
The figure of AES in the paper is produced by TkiZ [Jea16] . The work of this paper was supported by the National Key ...
doi:10.13154/tosc.v2017.i1.281-306
dblp:journals/tosc/SunGLYTQH17
fatcat:txrp6m7oxjbq3nbvcwxzfw4jky
Improved Rectangle Attacks on SKINNY and CRAFT
2021
IACR Transactions on Symmetric Cryptology
CRAFT is another SKINNY-like tweakable block cipher for which we provide the security analysis against rectangle attack for the first time. ...
Based on the improved boomerang distinguishers for SKINNY, we provide related-tweakey rectangle attacks on 23 rounds of SKINNY-64-128, 24 rounds of SKINNY-128-256, 29 rounds of SKINNY-64-192, and 30 rounds ...
Nasour Bagheri was supported in part by the Iran National Science Foundation (INSF) under contract No. 98010674. ...
doi:10.46586/tosc.v2021.i2.140-198
fatcat:xucyzoijpzapvfs7dcvcwegn3e
« Previous
Showing results 1 — 15 out of 56 results